US20100265845A1 - Wireless Local Area Network, Adapter Unit and Equipment - Google Patents

Wireless Local Area Network, Adapter Unit and Equipment Download PDF

Info

Publication number
US20100265845A1
US20100265845A1 US11/991,965 US99196506A US2010265845A1 US 20100265845 A1 US20100265845 A1 US 20100265845A1 US 99196506 A US99196506 A US 99196506A US 2010265845 A1 US2010265845 A1 US 2010265845A1
Authority
US
United States
Prior art keywords
network
local area
area network
access point
wireless
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/991,965
Inventor
Patrik Lampén
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NETWORK SERVICES FINLAND Oy
Original Assignee
NETWORK SERVICES FINLAND Oy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from FI20050292U external-priority patent/FI6974U1/en
Application filed by NETWORK SERVICES FINLAND Oy filed Critical NETWORK SERVICES FINLAND Oy
Assigned to NETWORK SERVICES FINLAND OY reassignment NETWORK SERVICES FINLAND OY ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: LAMPEN, PATRIK
Publication of US20100265845A1 publication Critical patent/US20100265845A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/088Access security using filters or firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices

Definitions

  • the invention relates to a wireless local area network.
  • a wireless local area network refers to a local area network of a restricted area such as an office, an airport or a hotel, to which the customer terminals within the area are connected wirelessly through the radio path.
  • the most common WLAN standard is the IEEE 802.11 and the different versions thereof.
  • a wireless local area network typically replaces or extends a wired local area network. If both a wired and a wireless local area network are employed in an office, the employees may continue to use the applications and information in the network in the wireless local area network when moving from one work place to another.
  • a wireless local area network is formed of one or more access points (AP), and of a wireless or wired network that interconnects the access points, and of other active devices, which control the traffic within the network or through a firewall to the Internet.
  • Mobile terminals which currently still refer mainly to portable computers, communicate over the radio path with the nearest access point.
  • a wireless local area network currently employs a 2.4 GHz frequency.
  • the terminal In order to be able to connect a wireless terminal to a wireless local area network, the terminal must be provided with a WLAN card, and if the network is public, then the user also has to have a subscription to the service provider.
  • Mobile telephone manufacturers and network interface card manufacturers make WLAN cards and the cards may either be external ones or integrated into the device.
  • WLAN cards may either be external ones or integrated into the device.
  • PDA personal digital assistants
  • Unprotected a wireless local area network poses a threat to the security of the network, and therefore the computer connected to the wireless local area network is to be secured in the same way as a computer attached to a wired local area network.
  • the computer should be provided with a security updated operating system, real-time antivirus software and a firewall.
  • the communications on radio channels provide a special challenge for the security of a wireless local area network. Basically anyone is able to passively pick up a signal transmitted over the radio path and many are those who are capable of actively disturbing the WLAN.
  • the wireless local area network is particularly susceptible to eavesdropping, to block a service and to unauthorized use of the network.
  • the access point When the WLAN device is brought to the service area of the access point, or it is switched on again, it has to be connected to the access point.
  • the connection requires that the device obtains information about the operation of the network. Therefore the access point sends at predetermined intervals messages including traffic information, i.e. beacon messages.
  • traffic information i.e. beacon messages.
  • These messages typically include in unencrypted form also the name, i.e. a Service Set ID (SSID), of the common network of the devices in the WLAN subsystem that is used for logically segmenting the subsystem concerned.
  • SSID Service Set ID
  • the WLAN device When the WLAN device is provided with a sufficient amount of information in order to participate in the network traffic, the device starts authentication that is either open or is based on a private key and a challenge-response procedure.
  • the WLAN device and the access point have to be provided with the same SSID in order to be able to establish a connection, and the access point prevents access from customer terminals, which are not provided with the SSID.
  • security is poor, since the access point continuously sends the SSID in plain text. Even though sending the SSID would be disabled, an intruder or a hacker may find out the SSID by “snooping”, i.e. monitoring the network traffic unnoticed.
  • Shared key authentication is more secure.
  • the aim of this process is to ensure that both parties are aware of the same common private key.
  • the access point requests the WLAN device to encrypt the message before transmission, and the received message is decrypted at the access point end.
  • the security scheme of the IEEE 802.11 standard aims to create such conditions that primarily provide the same security as a conventional wired local area network. The object is not to achieve security that spans the entire data connection; instead information is to be protected on the radio path.
  • WEP Wired Equivalent Privacy
  • the RC4 is a symmetric encryption method, where decryption is carried out with the same private WEP key used for encryption.
  • the most significant problem with symmetric encryption is the exchange of private key between parties.
  • the WEP key is input into each computer during the installation of a network interface card, whereby the encryption depends on the reliability of each user.
  • Wi-Fi Protected Access Wi-Fi Protected Access
  • TKIP protocol Temporal Key Integrity Protocol
  • AES Advanced Encryption Standard
  • DES Data Encryption Standard
  • 3DES Triple DES
  • Some WLAN manufacturers support authentication based on the physical MAC address of the client's network adapter. The access point allows a connection for the client only if the client's MAC address corresponds with the address in the authentication table of the access point. In addition, authentication servers etc, have been employed.
  • a WLAN device When a WLAN device is authenticated it is authorized to participate in the operation of the network, and association is started. At this stage the parties exchange information about their abilities, and the network registers the location of the WLAN station. When association is carried out the WLAN device may start transferring data in the network.
  • the most typical and known is the private wireless local area network used in companies.
  • the portable computers of the employees of a company communicate with the internal network of the company through an access point.
  • a firewall is provided between the access point and the internal wired network of the company.
  • the internal wired network is connected to a router, which in turn controls the traffic between the internal network of the company and the Internet.
  • a firewall is also provided between the internal network of the company and the external Internet.
  • City networks and “hot spots” are public wireless local area networks.
  • the hot spots are wireless local area networks provided in certain public premises, through which access to the Internet is possible.
  • a hot spot may be similar to an internal wireless network of an office except that anyone may buy a subscription to a public wireless local area network.
  • Hot spots are found for instance at airports, in hotels and in conference centres.
  • Public wireless local area networks provide access to the open internet. If the user desires to utilize the connection for telecommuting he/she should be provided with a separate data security solution, such as a virtual private network (VPN).
  • VPN virtual private network
  • What becomes a problem is to arrange different subscriptions, services and network resources in wireless networks of hot spot type in a way that prevents unauthorized access to the network, provides a secure connection to the users and allows special services for the users, while the adoption and installation of the subscription is easy for the user and possible to implement directly in most computers or corresponding customer terminals.
  • the object of the invention is achieved with a wireless local area network, an adapter unit and equipment, characterized in what is disclosed in the independent claims.
  • the preferred embodiments of the invention are disclosed in the dependent claims.
  • a service provider of a wireless local area network or another apparatus supplier delivers an apparatus to a customer, a so-called network adapter unit comprising a wireless network adapter part that the service provider or the other apparatus supplier has in advance configured to be connected to the wireless network through a particular access point or particular access points, which provide a predetermined service or services, and a wired network adapter part to be connected to a wired network interface of the customer terminal.
  • the customer terminal can preferably not be used to change or read configuration data.
  • Each access point is configured to allow access to the wireless local area network that takes place only through the compatibly configured adapter unit.
  • the service of the customer terminal is determined on the basis of the access point that the network adapter unit connected thereto employs.
  • the network adapter unit forms, in accordance with the principles of an embodiment of the invention, a part of the wireless local area network controlled by the service provider, even though the network adapter unit is handed over to the customer when used.
  • the customer obtains a device provided with a wired network interface with predetermined properties that the customer is not able to change.
  • the wireless network on the other side of the network adapter remains transparent to the customer terminal; the customer terminal operates as if connected to the wired network. Consequently the customer is not requested to carry out any specific configuration measures as would be the case if the customer terminal were connected to a wireless local area network using a conventional wireless local area network adapter.
  • the invention provides an easy way to obtain a secure wireless local area network connection with the desired service concept.
  • the invention allows offering tailor-made and secure local area network subscriptions and services to different users even for short periods of time.
  • the customer is provided with a subscription and service when he/she receives the network adapter unit, and the customer loses them when he/she returns the adapter unit. Since the information associated with the access to a wireless network is maintained within the network adapter unit and unattainable from the customer, information that is critical regarding the security of the network is not delivered to the customer.
  • the service obtained by the customer is determined according to the adapter unit that has been handed over, in which case the different services can easily be charged using different adapter unit rents.
  • the present invention is particularly advantageous in situations, where the customer needs a secure and protected network subscription or network resource for temporary use.
  • a network access and network resources may be provided for participants of conferences, meetings, fairs and other occasions.
  • the access point and each adapter unit are compatibly configured in advance by the equipment supplier to be wirelessly and securely connected only with each other.
  • the customer is provided with equipment that forms a complete secured local area network.
  • the wireless local area network on the other side of the network adapter remains transparent to the customer terminal, and the customer terminal operates as if connected to a wired network. No specific configuration measures are therefore required of the customer as would be the case if a wireless network were formed in a conventional manner of discrete components and the customer terminal were to be connected to the network by means of a conventional local area network adapter delivered with a computer.
  • the invention enables to easily set up a secure wireless local area network.
  • the secured local area network apparatus that is configured in advance according to the invention is particularly advantageous for establishing a small local area network at home or at the office.
  • FIG. 1 shows an example of a wireless local area network implemented in accordance with the principles of the invention.
  • the invention can be applied in different types of wireless local area networks.
  • a wireless local area network according to the IEEE 802 recommendations is used as an example, however, without limiting the invention thereto.
  • the technical properties, requirements and implementations of the WLAN used as an example are all explained in more detail in the recommendations IEEE 802.11b and IEEE 802.11g.
  • FIG. 1 shows an example of a wireless local area network applying the principles of the present invention.
  • the wireless local area network comprises network adapter units 2 A to 2 G and access points (AP) 3 , 4 A, 4 B, 4 C and 5 , which are connected to a larger network infrastructure 100 .
  • the network infrastructure 100 symbolically represents any network configuration of a service provider that provides the desired services and/or offers the desired network resources for the customer terminals, e.g. workstations WS 1 to WS 7 .
  • the network infrastructure comprises switches 6 A, 6 B, 6 C and 6 D, a router 9 and servers 7 , 8 .
  • the wireless local area network infrastructure 100 which may form for instance an intranet, preferably comprises a gateway to a wide area network (WAN) 10 , i.e. the Internet.
  • WAN wide area network
  • the customer terminal e.g. the workstation WS 1 to WS 7
  • a wired network adapter such as an Ethernet network interface card.
  • Most computers are currently delivered with a network interface card, whereby they can be directly connected to a wired network without requiring any measures carried out by the user.
  • Each network adapter unit 2 A to 2 G may comprise a wireless local area network (WLAN) adapter part 21 and a wired local area network (LAN) adapter part 22 .
  • the LAN adapter part 22 forms a wired network interface (for instance Ethernet) to the customer terminal WS 1 to WS 7 .
  • the unit 2 A to 2 G has the power supplied for instance from a battery, an external power source, through a network interface from the network interface card of the cu stomer terminal (for instance PoE, Power over Ethernet) or from a USB connector in the customer terminal.
  • the customer terminal WS 1 to WS 7 may be connected to the LAN adapter part 22 with a conventional network cable or in a wireless manner, using for instance Bluetooth, infrared or another short range wireless technique.
  • the network adapter unit 2 A to 2 G is similar to any wired network access point.
  • the WLAN adapter part 21 is connected to the infrastructure 100 of the wireless local area network with the secured WLAN connection (IEEE 802.11) through an access point (AP) 3 , 4 A, 4 B, 4 C or 5 (also referred to as a base station).
  • AP access point
  • AP access point
  • 4 A, 4 B, 4 C or 5 also referred to as a base station
  • Data traffic arriving to the LAN adapter part 22 from the customer terminal is transmitted within the adapter unit 2 A to 2 G to the WALN adapter part 21 , which forwards the data traffic in secured mode to the access point (AP) 3 , 4 A, 4 B, 4 C or 5 .
  • the security of the data traffic received from the access point (AP) 3 , 4 A, 4 B, 4 C or 5 is removed (e.g. decrypted) and the data traffic is transmitted through the LAN adapter part 22 to the customer terminal.
  • the wireless network adapter units 2 A to 2 G are configured in advance before the units are delivered to the user.
  • the network adapter unit 2 A to 2 G may be provided with a graphical user interface or a command line based user interface, for instance through the LAN adapter part.
  • unauthorized use of the user interface is not possible for the user of the customer terminal 2 A to 2 G and access to the configuration data of the network adapter unit may be possible only by means of, for instance, a password or another appropriate technique.
  • a fixed configuration may also be provided in the adapter unit.
  • the network adapter unit 2 A to 2 G is, in accordance with the principles of an embodiment of the invention, a part of a wireless local area network controlled by the service provider, even though the network adapter unit is handed over to the customer when used.
  • the customer obtains a device provided with a network subscription with predetermined properties, which the customer is unable to change himself/herself.
  • the wireless local area network on the other side of the network adapter 2 A to 2 G remains transparent to the customer terminal, the customer terminal operates as if connected to a wired network. Consequently no particular configuration measures are required of the customer as would be the case if the customer terminal were connected to a wireless local area network using a conventional WLAN adapter.
  • the invention provides an easy way to establish a secure wireless local area network connection with the desired service concept.
  • the invention also provides an easy way to establish a secured local area network controlled by the customer himself/herself.
  • the supplier such as the equipment manufacturer or vendor
  • the equipment package comprising an access point and a desired number of adapter units configures the access point and each adapter unit so as to be compatible for a secure wireless communication only with each other.
  • the customer obtains the equipment, which establishes a ready-to-use secured local area network.
  • the wired network interface of the adapter unit is connected to the customer terminal, such as a computer.
  • the access point is connected to a desired target, for instance to provide an Internet connection.
  • the wireless local area network behind the network adapter remains transparent to the customer terminal, the customer terminal operates as if connected to the wired network.
  • the invention provides a simple and easy way to establish a secure wireless local area network without requiring a more specific knowledge of the local area network.
  • the customer only needs to buy a ready configured equipment package provided with the desired number of compatibly configured adapter units and access points. Different equipment packages are independent of one another and secured from each other.
  • the local area network equipment according to the invention that is configured and secured in advance is particularly advantageous for establishing a small local area network at home or at the office.
  • the invention enables to provide tailor-made and secure local area network subscriptions for different users even for short periods of time.
  • the customer obtains a network adapter unit when he/she receives the subscription and the service and loses them when he/she returns the adapter unit. Since information associated with access to the wireless network is maintained within the network adapter unit and remains unreachable for the customer, information that is critical to the security of the network is therefore not delivered to the customer.
  • the configuration of the network adapter unit 2 A to 2 G may comprise for instance the following information.
  • the user interface of the unit may be provided with a user identification and a password, which allow examining and/or changing the settings of the adapter unit later.
  • the service provider may provide the system software of the WLAN adapter part 21 in advance with a name of the wireless network to be used (SSID), an encryption key index of the network, an encryption algorithm or method to be used (for instance WEP, WPA, WPA-PSK, DES, 3DES, AES), an encryption key and a radio channel to be used. Alternatively the selection of channel can be carried out automatically.
  • the settings are defined according to the fact in which access point (AP) 3 , 4 A, 4 B, 4 C or 5 the customer terminal WS 1 to WS 7 of the user of the network adapter unit is to be logged. Different services may be provided through the different access points (AP) 3 , 4 A, 4 B, 4 C or 5 .
  • DHCP Dynamic Host Configuration Protocol
  • the service provider of the system in this case the wireless local area network 100 , provides an IP address area for the HDCP and each customer terminal WS 1 to WS 8 includes TCP/IP software requesting the IP address from the DHCP server.
  • TCP/IP Transmission Control Protocol
  • the server 7 is a DHCP server that distributes the information concerned to the customer terminals 2 A to 2 G via the intranet, the switches 6 A to 6 D, the access point (AP) 3 , 4 A, 4 B, 4 C, 5 and the network adapter unit 2 A to 2 G.
  • the server 7 itself may also operate as the DNS and/or WINS server and resolve the name (DNS, WINS) of the intranet resources or resolve (DNS) Internet addresses.
  • the system software of the LAN adapter part 21 may configure it to distribute the IP address, the subnetwork mask and the default gateway and the name servers (DNS) and WINS servers automatically (DHCP) to the customer terminal connected thereto. In a way the adapter part 21 thus operates as the DHCP server.
  • the network adapter unit according to the invention may be implemented, for instance, using an access point DWL-730AP of the D-Link Systems Inc, the Ethernet interface of which receives a network cable of the customer terminal and is powered from the USB connector of the customer terminal.
  • the service provider configures the DWL-730AP to operate in accordance with the principles of the invention.
  • the network infrastructure 100 comprises controllable network switches 6 A to 6 D, which are used to connect the access points (AP) 3 , 4 A, 4 B, 4 C and 5 of the wireless network with each other and/or to different services offered in the network and/or to the Internet 10 .
  • What is defined for the network adapter of the local area network side of the router 9 is a fixed IP address, which operates as the default gateway of the wireless customer terminals WS 1 to WS 7 to the Internet 10 .
  • the network adapter of the external network 10 of the router 9 automatically (DHCP) retrieves the IP address and the addresses of the name server from the network of the service provider. Alternatively they can be inputted into the router manually.
  • the router may also comprise a firewall and services corresponding to the DHCP, DHS, WINS, file and/or resource servers 7 and 8 .
  • the maximum speed of the ports of the different switches 6 A to 6 D can be limited, in which case Internet connections operating at different speeds may be offered to be used by the customer terminals WS 1 to WS 7 according to the access point through which the connection is established.
  • virtual networks VLAN may be created in the switch network, the virtual networks enabling access to some or all of these services.
  • the service provided in addition to the Internet service is a file and resource server 8 , from which shared disk resources, the right of use of software or other services can be assigned to different users.
  • An example of an appropriate router 9 is a DFL-700 of the D-Link Systems Inc, which comprises a firewall and a router, which employs the DHCP for distributing IP addresses.
  • Each access point (AP) 3 , 4 A, 4 B, 4 C and 5 is fixedly connected to a port in one of the switches 6 A to 6 D of the network infrastructure 100 .
  • the system software of the access point 3 is provided with a user name and a password, which allow checking and/or changing the settings of the access point later through the user interface.
  • What is also inputted in advance into the system software is a name of the wireless network to be used (SSID), an encryption key index of the network, an encryption algorithm or method to be used (for example WEP, WPA, WPA-PSK, DES, 3DES or AES), an encryption key and the radio channel to be used. Alternatively the selection of channel can be set to take place automatically.
  • the settings are defined according to the customer terminals, which are to be logged in to this particular access point, or according to the services, which are to be provided through the access point.
  • the network name (SSID) can also be hidden in order to improve data security. If the wired network adapter part 22 in the network adapter unit 2 A to 2 G is used to automatically distribute the IP address, the sub-network mask, the default gateway, the name servers and/or the WINS servers to the customer terminal connected thereto, then the access point may employ a MAC filter, in which case only the predetermined network adapter units with matching MAC addresses can access to the access point 110 or to the network infrastructure 100 through the access point.
  • An example of an appropriate access point (AP) 3 , 4 A, 4 B, 4 C and 5 is the DWL-2100SP of the D-Link Systems Inc.
  • the network adapter units 2 A and 2 B are configured such that they are logged in the access point (AP) 3 or in another similarly configured access point.
  • the adapter units 2 A and 2 B as well as the access point (AP) 3 thus form a pre-configured equipment package.
  • the access point (AP) 3 is in turn connected to a port at the switch 6 A of the network infrastructure 100 .
  • the switches of the infrastructure 100 are configured such that the customer terminals WS 1 and WS 2 , which have a wireless connection through the network adapter units 2 A and 2 B to the access point 3 may have access to the disk or other network resources with a separate server 8 and to the Internet connection through a router 9 .
  • the access points (AP) 4 A, 4 B and 4 C are configured identically among one another.
  • the network adapter units 2 C, 2 D, 2 E and 2 F are configured such that they may be logged in the access points (AP) 4 A, 4 B and 4 C or in other correspondingly configured access points.
  • the access point 4 A is connected to a port at the switch 6 A
  • the access point 4 B is connected to a port at the switch 6 B
  • the access point 4 C is connected to a port at the switch 6 C.
  • the switches of the infrastructure 100 are configured such that the customer terminals WS 3 to WS 6 having wireless connection through the network adapter units 2 C, 2 D, 2 E and 2 F to the access points 4 A, 4 B and 4 C have access to the Internet only through the router 9 .
  • the network adapter 2 G is configured such that it is logged in the access point (AP) 5 or in another similarly configured access point.
  • the access point (AP) 5 is in turn connected to a port at the switch 6 C.
  • the switches of the infrastructure 100 are configured such that the customer terminal WS 7 , which is wirelessly connected through the network adapter units 2 A and 2 B to the access point 5 has access to the Internet at limited speed through the router 9 .
  • the speed limitation of the Internet connection is set to the port of the switch 6 C or 6 D.
  • the infrastructure shown in FIG. 1 can be provided with a new secured local area network by providing a new equipment package according to the invention comprising a compatibly configured access point and an adapter unit.
  • a simple local area network infrastructure such as a home network, can be established using a single equipment package, for instance the adapter unit 2 A and 2 B and access point (AP) 3 .
  • the access point is connected directly to the desired service or to the network, for instance with an ADSL modem to the Internet.
  • the only measures required of the user are then connecting the network interface of the computer to the adapter unit and connecting the access point to the ADSL modem, for instance with a LAN cable. No configurations taking place in the computer are required.
  • the wireless local area network according to the invention is preferably arranged to prevent connections between customer terminals and to allow only the connection from the customer terminal to the Internet or another service intended thereto.
  • a customer terminal can preferably not observe presence of other terminals in the wireless local area network. These measures increase the security of the wireless local area network.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Small-Scale Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Equipment for a wireless local area network comprises at least one adapter unit (2A to 2G) including a wired network adapter part (22) to be connected to a wired network interface of a computer (WS1 to WS7) and a wireless network adapter part (21), and a wireless network access point (3, 4, 5). The access point (3, 4, 5) and the adapter unit are configured in advance by the supplier of the adapter unit to provide a secure wireless connection only with one another.

Description

    BACKGROUND OF THE INVENTION
  • The invention relates to a wireless local area network.
  • A wireless local area network (WLAN) refers to a local area network of a restricted area such as an office, an airport or a hotel, to which the customer terminals within the area are connected wirelessly through the radio path. The most common WLAN standard is the IEEE 802.11 and the different versions thereof. A wireless local area network typically replaces or extends a wired local area network. If both a wired and a wireless local area network are employed in an office, the employees may continue to use the applications and information in the network in the wireless local area network when moving from one work place to another.
  • A wireless local area network is formed of one or more access points (AP), and of a wireless or wired network that interconnects the access points, and of other active devices, which control the traffic within the network or through a firewall to the Internet. Mobile terminals, which currently still refer mainly to portable computers, communicate over the radio path with the nearest access point. A wireless local area network currently employs a 2.4 GHz frequency.
  • In order to be able to connect a wireless terminal to a wireless local area network, the terminal must be provided with a WLAN card, and if the network is public, then the user also has to have a subscription to the service provider. Mobile telephone manufacturers and network interface card manufacturers make WLAN cards and the cards may either be external ones or integrated into the device. Currently most of the devices employed in the wireless local area network are portable computers, but in the near future also other mobile stations utilizing WLAN and personal digital assistants (PDA) are likely to become common. In this description the various WLAN devices will be commonly referred to as customer terminals.
  • Unprotected a wireless local area network poses a threat to the security of the network, and therefore the computer connected to the wireless local area network is to be secured in the same way as a computer attached to a wired local area network. The computer should be provided with a security updated operating system, real-time antivirus software and a firewall. The communications on radio channels provide a special challenge for the security of a wireless local area network. Basically anyone is able to passively pick up a signal transmitted over the radio path and many are those who are capable of actively disturbing the WLAN. The wireless local area network is particularly susceptible to eavesdropping, to block a service and to unauthorized use of the network.
  • When the WLAN device is brought to the service area of the access point, or it is switched on again, it has to be connected to the access point. The connection requires that the device obtains information about the operation of the network. Therefore the access point sends at predetermined intervals messages including traffic information, i.e. beacon messages. These messages typically include in unencrypted form also the name, i.e. a Service Set ID (SSID), of the common network of the devices in the WLAN subsystem that is used for logically segmenting the subsystem concerned. When the WLAN device is provided with a sufficient amount of information in order to participate in the network traffic, the device starts authentication that is either open or is based on a private key and a challenge-response procedure. In the open authentication the WLAN device and the access point have to be provided with the same SSID in order to be able to establish a connection, and the access point prevents access from customer terminals, which are not provided with the SSID. However, security is poor, since the access point continuously sends the SSID in plain text. Even though sending the SSID would be disabled, an intruder or a hacker may find out the SSID by “snooping”, i.e. monitoring the network traffic unnoticed.
  • Shared key authentication is more secure. The aim of this process is to ensure that both parties are aware of the same common private key. The access point requests the WLAN device to encrypt the message before transmission, and the received message is decrypted at the access point end. The security scheme of the IEEE 802.11 standard aims to create such conditions that primarily provide the same security as a conventional wired local area network. The object is not to achieve security that spans the entire data connection; instead information is to be protected on the radio path. The first version of the IEEE 802.11 standard concerning security is referred to as WEP (Wired Equivalent Privacy), which in addition to authentication covers securing the information to be transferred using an RC4 stream cipher. The RC4 is a symmetric encryption method, where decryption is carried out with the same private WEP key used for encryption. The most significant problem with symmetric encryption is the exchange of private key between parties. In general the WEP key is input into each computer during the installation of a network interface card, whereby the encryption depends on the reliability of each user.
  • WEP encryption lost ground when a security hole was revealed, and therefore the IEEE 802.11g version employs a replacement technique WPA (Wi-Fi Protected Access), wherein a session-specific private key is provided and the private key is automatically exchanged using a TKIP protocol (Temporary Key Integrity Protocol). Examples of other substitute techniques include WPA-PSK, AES (Advanced Encryption Standard), DES (Data Encryption Standard), 3DES (Triple DES) etc. Some WLAN manufacturers support authentication based on the physical MAC address of the client's network adapter. The access point allows a connection for the client only if the client's MAC address corresponds with the address in the authentication table of the access point. In addition, authentication servers etc, have been employed.
  • When a WLAN device is authenticated it is authorized to participate in the operation of the network, and association is started. At this stage the parties exchange information about their abilities, and the network registers the location of the WLAN station. When association is carried out the WLAN device may start transferring data in the network.
  • Three main types of different wireless local area networks exist. The most typical and known is the private wireless local area network used in companies. Here the portable computers of the employees of a company communicate with the internal network of the company through an access point. Often a firewall is provided between the access point and the internal wired network of the company. The internal wired network is connected to a router, which in turn controls the traffic between the internal network of the company and the Internet. Generally a firewall is also provided between the internal network of the company and the external Internet. City networks and “hot spots” are public wireless local area networks. The hot spots are wireless local area networks provided in certain public premises, through which access to the Internet is possible. Technically a hot spot may be similar to an internal wireless network of an office except that anyone may buy a subscription to a public wireless local area network. Hot spots are found for instance at airports, in hotels and in conference centres. Public wireless local area networks provide access to the open internet. If the user desires to utilize the connection for telecommuting he/she should be provided with a separate data security solution, such as a virtual private network (VPN).
  • What becomes a problem is to arrange different subscriptions, services and network resources in wireless networks of hot spot type in a way that prevents unauthorized access to the network, provides a secure connection to the users and allows special services for the users, while the adoption and installation of the subscription is easy for the user and possible to implement directly in most computers or corresponding customer terminals.
  • BRIEF DESCRIPTION OF THE INVENTION
  • It is an object of the invention to provide a new solution for providing a wireless local area network subscription to users, particularly in a wireless network of hot spot type.
  • The object of the invention is achieved with a wireless local area network, an adapter unit and equipment, characterized in what is disclosed in the independent claims. The preferred embodiments of the invention are disclosed in the dependent claims.
  • In accordance with an embodiment of the invention a service provider of a wireless local area network or another apparatus supplier delivers an apparatus to a customer, a so-called network adapter unit comprising a wireless network adapter part that the service provider or the other apparatus supplier has in advance configured to be connected to the wireless network through a particular access point or particular access points, which provide a predetermined service or services, and a wired network adapter part to be connected to a wired network interface of the customer terminal. The customer terminal can preferably not be used to change or read configuration data. Each access point is configured to allow access to the wireless local area network that takes place only through the compatibly configured adapter unit. Furthermore the service of the customer terminal is determined on the basis of the access point that the network adapter unit connected thereto employs.
  • Thus the network adapter unit forms, in accordance with the principles of an embodiment of the invention, a part of the wireless local area network controlled by the service provider, even though the network adapter unit is handed over to the customer when used. The customer obtains a device provided with a wired network interface with predetermined properties that the customer is not able to change. The wireless network on the other side of the network adapter remains transparent to the customer terminal; the customer terminal operates as if connected to the wired network. Consequently the customer is not requested to carry out any specific configuration measures as would be the case if the customer terminal were connected to a wireless local area network using a conventional wireless local area network adapter. As regards the customer, the invention provides an easy way to obtain a secure wireless local area network connection with the desired service concept.
  • For the service provider the invention allows offering tailor-made and secure local area network subscriptions and services to different users even for short periods of time. The customer is provided with a subscription and service when he/she receives the network adapter unit, and the customer loses them when he/she returns the adapter unit. Since the information associated with the access to a wireless network is maintained within the network adapter unit and unattainable from the customer, information that is critical regarding the security of the network is not delivered to the customer. The service obtained by the customer is determined according to the adapter unit that has been handed over, in which case the different services can easily be charged using different adapter unit rents. The present invention is particularly advantageous in situations, where the customer needs a secure and protected network subscription or network resource for temporary use. Such a need arises for instance when sports editors attend sporting events; the invention allows the sports editors to communicate with their editorial staff directly from the stand without having to be near a wired network interface in a media room. Correspondingly a network access and network resources may be provided for participants of conferences, meetings, fairs and other occasions.
  • In equipment according to an embodiment of the invention comprising an access point and a desired amount of adapter units, the access point and each adapter unit are compatibly configured in advance by the equipment supplier to be wirelessly and securely connected only with each other. The customer is provided with equipment that forms a complete secured local area network. The wireless local area network on the other side of the network adapter remains transparent to the customer terminal, and the customer terminal operates as if connected to a wired network. No specific configuration measures are therefore required of the customer as would be the case if a wireless network were formed in a conventional manner of discrete components and the customer terminal were to be connected to the network by means of a conventional local area network adapter delivered with a computer. For the user the invention enables to easily set up a secure wireless local area network. The secured local area network apparatus that is configured in advance according to the invention is particularly advantageous for establishing a small local area network at home or at the office.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • In the following the invention will be explained in greater detail by means of the preferred embodiments with reference to the accompanying drawing, in which FIG. 1 shows an example of a wireless local area network implemented in accordance with the principles of the invention.
  • DETAILED DESCRIPTION OF THE INVENTION
  • The invention can be applied in different types of wireless local area networks. In the following description a wireless local area network according to the IEEE 802 recommendations is used as an example, however, without limiting the invention thereto. The technical properties, requirements and implementations of the WLAN used as an example are all explained in more detail in the recommendations IEEE 802.11b and IEEE 802.11g.
  • FIG. 1 shows an example of a wireless local area network applying the principles of the present invention. The wireless local area network comprises network adapter units 2A to 2G and access points (AP) 3, 4A, 4B, 4C and 5, which are connected to a larger network infrastructure 100. The network infrastructure 100 symbolically represents any network configuration of a service provider that provides the desired services and/or offers the desired network resources for the customer terminals, e.g. workstations WS1 to WS7. In the example shown in FIG. 1, the network infrastructure comprises switches 6A, 6B, 6C and 6D, a router 9 and servers 7, 8. The wireless local area network infrastructure 100, which may form for instance an intranet, preferably comprises a gateway to a wide area network (WAN) 10, i.e. the Internet.
  • The customer terminal, e.g. the workstation WS1 to WS7, may be any portable or other computer or corresponding device (a Gameboy, a printer, a PDA etc.) comprising a wired network adapter, such as an Ethernet network interface card. Most computers are currently delivered with a network interface card, whereby they can be directly connected to a wired network without requiring any measures carried out by the user.
  • Each network adapter unit 2A to 2G may comprise a wireless local area network (WLAN) adapter part 21 and a wired local area network (LAN) adapter part 22. The LAN adapter part 22 forms a wired network interface (for instance Ethernet) to the customer terminal WS1 to WS7. The unit 2A to 2G has the power supplied for instance from a battery, an external power source, through a network interface from the network interface card of the cu stomer terminal (for instance PoE, Power over Ethernet) or from a USB connector in the customer terminal. The customer terminal WS1 to WS7 may be connected to the LAN adapter part 22 with a conventional network cable or in a wireless manner, using for instance Bluetooth, infrared or another short range wireless technique. As regards the customer terminal, the network adapter unit 2A to 2G is similar to any wired network access point. The WLAN adapter part 21 is connected to the infrastructure 100 of the wireless local area network with the secured WLAN connection (IEEE 802.11) through an access point (AP) 3, 4A, 4B, 4C or 5 (also referred to as a base station). Data traffic arriving to the LAN adapter part 22 from the customer terminal is transmitted within the adapter unit 2A to 2G to the WALN adapter part 21, which forwards the data traffic in secured mode to the access point (AP) 3, 4A, 4B, 4C or 5. Correspondingly the security of the data traffic received from the access point (AP) 3, 4A, 4B, 4C or 5 is removed (e.g. decrypted) and the data traffic is transmitted through the LAN adapter part 22 to the customer terminal.
  • In accordance with an embodiment of the invention the wireless network adapter units 2A to 2G are configured in advance before the units are delivered to the user. For configuration the network adapter unit 2A to 2G may be provided with a graphical user interface or a command line based user interface, for instance through the LAN adapter part. However, unauthorized use of the user interface is not possible for the user of the customer terminal 2A to 2G and access to the configuration data of the network adapter unit may be possible only by means of, for instance, a password or another appropriate technique. A fixed configuration may also be provided in the adapter unit. Thus, the network adapter unit 2A to 2G is, in accordance with the principles of an embodiment of the invention, a part of a wireless local area network controlled by the service provider, even though the network adapter unit is handed over to the customer when used. The customer obtains a device provided with a network subscription with predetermined properties, which the customer is unable to change himself/herself. The wireless local area network on the other side of the network adapter 2A to 2G remains transparent to the customer terminal, the customer terminal operates as if connected to a wired network. Consequently no particular configuration measures are required of the customer as would be the case if the customer terminal were connected to a wireless local area network using a conventional WLAN adapter. As regards the user, the invention provides an easy way to establish a secure wireless local area network connection with the desired service concept.
  • The invention also provides an easy way to establish a secured local area network controlled by the customer himself/herself. During manufacture, or at sale or delivery the supplier (such as the equipment manufacturer or vendor) of the equipment package comprising an access point and a desired number of adapter units configures the access point and each adapter unit so as to be compatible for a secure wireless communication only with each other. The customer obtains the equipment, which establishes a ready-to-use secured local area network. The wired network interface of the adapter unit is connected to the customer terminal, such as a computer. The access point is connected to a desired target, for instance to provide an Internet connection. The wireless local area network behind the network adapter remains transparent to the customer terminal, the customer terminal operates as if connected to the wired network. Thus, no particular configuration measures are required of the customer for setting up a wireless local area network as would be the case if the customer terminal were to be connected to a wireless local area network, which is set up using separately delivered components, such as a wireless base station and an integrated local area network adapter of the computer. As regards the customer, the invention provides a simple and easy way to establish a secure wireless local area network without requiring a more specific knowledge of the local area network. The customer only needs to buy a ready configured equipment package provided with the desired number of compatibly configured adapter units and access points. Different equipment packages are independent of one another and secured from each other. The local area network equipment according to the invention that is configured and secured in advance is particularly advantageous for establishing a small local area network at home or at the office.
  • For a service provider the invention enables to provide tailor-made and secure local area network subscriptions for different users even for short periods of time. The customer obtains a network adapter unit when he/she receives the subscription and the service and loses them when he/she returns the adapter unit. Since information associated with access to the wireless network is maintained within the network adapter unit and remains unreachable for the customer, information that is critical to the security of the network is therefore not delivered to the customer.
  • The configuration of the network adapter unit 2A to 2G may comprise for instance the following information. The user interface of the unit may be provided with a user identification and a password, which allow examining and/or changing the settings of the adapter unit later. The service provider may provide the system software of the WLAN adapter part 21 in advance with a name of the wireless network to be used (SSID), an encryption key index of the network, an encryption algorithm or method to be used (for instance WEP, WPA, WPA-PSK, DES, 3DES, AES), an encryption key and a radio channel to be used. Alternatively the selection of channel can be carried out automatically. The settings are defined according to the fact in which access point (AP) 3, 4A, 4B, 4C or 5 the customer terminal WS1 to WS7 of the user of the network adapter unit is to be logged. Different services may be provided through the different access points (AP) 3, 4A, 4B, 4C or 5.
  • What is defined in the wired local area network (LAN) adapter part 21 for the network adapter unit 2A to 2G is a static IP address, a sub-network mask, and a default gateway and name servers (DNS) and WINS servers to be used if necessary. These variables can alternatively be retrieved automatically (DHCP) through the wireless local area network infrastructure 100. The DHCP (Dynamic Host Configuration Protocol) is a protocol that is used for allocating a dynamic IP address. The service provider of the system, in this case the wireless local area network 100, provides an IP address area for the HDCP and each customer terminal WS1 to WS8 includes TCP/IP software requesting the IP address from the DHCP server. In the example shown in FIG. 1 the server 7 is a DHCP server that distributes the information concerned to the customer terminals 2A to 2G via the intranet, the switches 6A to 6D, the access point (AP) 3, 4A, 4B, 4C, 5 and the network adapter unit 2A to 2G. The server 7 itself may also operate as the DNS and/or WINS server and resolve the name (DNS, WINS) of the intranet resources or resolve (DNS) Internet addresses. In an embodiment of the invention, the system software of the LAN adapter part 21 may configure it to distribute the IP address, the subnetwork mask and the default gateway and the name servers (DNS) and WINS servers automatically (DHCP) to the customer terminal connected thereto. In a way the adapter part 21 thus operates as the DHCP server. The network adapter unit according to the invention may be implemented, for instance, using an access point DWL-730AP of the D-Link Systems Inc, the Ethernet interface of which receives a network cable of the customer terminal and is powered from the USB connector of the customer terminal. The service provider configures the DWL-730AP to operate in accordance with the principles of the invention.
  • In the example shown in FIG. 1, the network infrastructure 100 comprises controllable network switches 6A to 6D, which are used to connect the access points (AP) 3, 4A, 4B, 4C and 5 of the wireless network with each other and/or to different services offered in the network and/or to the Internet 10. What is defined for the network adapter of the local area network side of the router 9 is a fixed IP address, which operates as the default gateway of the wireless customer terminals WS1 to WS7 to the Internet 10. The network adapter of the external network 10 of the router 9 automatically (DHCP) retrieves the IP address and the addresses of the name server from the network of the service provider. Alternatively they can be inputted into the router manually. The router may also comprise a firewall and services corresponding to the DHCP, DHS, WINS, file and/or resource servers 7 and 8. In an embodiment the maximum speed of the ports of the different switches 6A to 6D can be limited, in which case Internet connections operating at different speeds may be offered to be used by the customer terminals WS1 to WS7 according to the access point through which the connection is established. In an embodiment, virtual networks (VLAN) may be created in the switch network, the virtual networks enabling access to some or all of these services. In the example shown in FIG. 1, the service provided in addition to the Internet service is a file and resource server 8, from which shared disk resources, the right of use of software or other services can be assigned to different users. An example of an appropriate router 9 is a DFL-700 of the D-Link Systems Inc, which comprises a firewall and a router, which employs the DHCP for distributing IP addresses.
  • Each access point (AP) 3, 4A, 4B, 4C and 5 is fixedly connected to a port in one of the switches 6A to 6D of the network infrastructure 100. The system software of the access point 3 is provided with a user name and a password, which allow checking and/or changing the settings of the access point later through the user interface. What is also inputted in advance into the system software, for instance through the service provider or the apparatus manufacturer, is a name of the wireless network to be used (SSID), an encryption key index of the network, an encryption algorithm or method to be used (for example WEP, WPA, WPA-PSK, DES, 3DES or AES), an encryption key and the radio channel to be used. Alternatively the selection of channel can be set to take place automatically. The settings are defined according to the customer terminals, which are to be logged in to this particular access point, or according to the services, which are to be provided through the access point. The network name (SSID) can also be hidden in order to improve data security. If the wired network adapter part 22 in the network adapter unit 2A to 2G is used to automatically distribute the IP address, the sub-network mask, the default gateway, the name servers and/or the WINS servers to the customer terminal connected thereto, then the access point may employ a MAC filter, in which case only the predetermined network adapter units with matching MAC addresses can access to the access point 110 or to the network infrastructure 100 through the access point. Consequently access to the network infrastructure can be prevented even though the name of the wireless network, the radio channel to be used, the encryption algorithm and the encryption key were known to the user. An example of an appropriate access point (AP) 3, 4A, 4B, 4C and 5 is the DWL-2100SP of the D-Link Systems Inc.
  • Let us examine, by way of example, how the customers may in accordance with the invention be provided with different services depending on to which access point the network adapter 2A to 2G is configured to be connected. The same principle can be applied to create a desired number of different services.
  • The network adapter units 2A and 2B are configured such that they are logged in the access point (AP) 3 or in another similarly configured access point. The adapter units 2A and 2B as well as the access point (AP) 3 thus form a pre-configured equipment package. The access point (AP) 3 is in turn connected to a port at the switch 6A of the network infrastructure 100. The switches of the infrastructure 100 are configured such that the customer terminals WS1 and WS2, which have a wireless connection through the network adapter units 2A and 2B to the access point 3 may have access to the disk or other network resources with a separate server 8 and to the Internet connection through a router 9.
  • The access points (AP) 4A, 4B and 4C are configured identically among one another. The network adapter units 2C, 2D, 2E and 2F are configured such that they may be logged in the access points (AP) 4A, 4B and 4C or in other correspondingly configured access points. The access point 4A is connected to a port at the switch 6A, the access point 4B is connected to a port at the switch 6B and the access point 4C is connected to a port at the switch 6C. The switches of the infrastructure 100 are configured such that the customer terminals WS3 to WS6 having wireless connection through the network adapter units 2C, 2D, 2E and 2F to the access points 4A, 4B and 4C have access to the Internet only through the router 9.
  • The network adapter 2G is configured such that it is logged in the access point (AP) 5 or in another similarly configured access point. The access point (AP) 5 is in turn connected to a port at the switch 6C. The switches of the infrastructure 100 are configured such that the customer terminal WS7, which is wirelessly connected through the network adapter units 2A and 2B to the access point 5 has access to the Internet at limited speed through the router 9. The speed limitation of the Internet connection is set to the port of the switch 6C or 6D.
  • The infrastructure shown in FIG. 1 can be provided with a new secured local area network by providing a new equipment package according to the invention comprising a compatibly configured access point and an adapter unit.
  • A simple local area network infrastructure, such as a home network, can be established using a single equipment package, for instance the adapter unit 2A and 2B and access point (AP) 3. The access point is connected directly to the desired service or to the network, for instance with an ADSL modem to the Internet. The only measures required of the user are then connecting the network interface of the computer to the adapter unit and connecting the access point to the ADSL modem, for instance with a LAN cable. No configurations taking place in the computer are required.
  • The wireless local area network according to the invention is preferably arranged to prevent connections between customer terminals and to allow only the connection from the customer terminal to the Internet or another service intended thereto. A customer terminal can preferably not observe presence of other terminals in the wireless local area network. These measures increase the security of the wireless local area network.
  • It is apparent to those skilled in the art that as technology progresses the basic idea of the invention can be implemented in various ways. The invention and the embodiments thereof are therefore not restricted to the above examples but may vary within the scope of the claims.

Claims (15)

1. A local area network comprising at least one access point (3, 4, 5) for connecting at least one customer computer (WS1 to WS7) over a wireless interface to the local area network, characterized in that the local area network comprises at least one adapter unit (2A to 2G) including a wireless network adapter part (21), which is in advance configured for a secure wireless connection with a predetermined access point (3, 4, 5) of the wireless network, and a wired network adapter part (22) to be connected to a wired network interface of the customer terminal (WS1 to WS7), and in that the access point (3, 4) is configured in advance to allow the access to a wireless local area network only from the compatibly configured adapter unit (2A to 2G).
2. A local area network as claimed in claim 1, characterized in that the local area network comprises at least two differently configured access points (3, 4, 5) for different services and/or user groups, and in that each adapter unit (2A to 2G) is configured to be connected to an access point or access points with one type of configuration only.
3. A local area network as claimed in claim 1 or 2, characterized in that access of the customer computer (WS1 to WS7) is prevented to the configuration data of the adapter unit (2A to 2G).
4. A local area network as claimed in claim 1, 2 or 3, characterized in that the configuration data of the access point (3, 4, 5) and the adapter unit (2A to 2G) comprise one or more of the following: a name of the wireless network, an encryption key index of the network, an encryption algorithm or method to be used, an encryption key and a radio channel to be used.
5. A local area network as claimed in claim 1, 2, 3 or 4, characterized in that an IP address, a sub-network mask and/or a default gateway and name servers and possible WINS servers for the customer terminal (WS1 to WS7) are configured or retrieved through the wireless network to the wired network adapter part (22) of the adapter unit (2A to 2G), or the wired network adapter part (22) is arranged to automatically distribute them.
6. A local area network as claimed in any one of the previous claims, characterized in that the access points (3, 4, 5) are arranged to hide or to remove the name of the wireless network in their transmission, that the local area network comprises means for hiding and securing the customer terminals and the connections thereof from one another.
7. A local area network as claimed in any one of the previous claims, characterized in that at least one access point (3, 4, 5) comprises a device address filter for allowing connection to the network for only the adapter units provided with particular device addresses.
8. A local area network as claimed in any one of the previous claims, characterized in that the local area network comprises a server (7) for distributing one or more of the following data items through the access point and the adapter unit to the customer terminal; an IP address, a subnetwork mask and/or a default gateway and name servers and WINS servers.
9. A local area network as claimed in any one of the previous claims, characterized in that the local area network comprises means (6A to 6D), preferably one or more switches for providing an Internet connection and/or a memory resource and/or another network resource to the customer computer (WS1 to WS7) according to the access point (3, 4, 5) used for connection.
10. A local area network as claimed in claim 9, characterized in that the means (6A to 6D) comprise means for creating virtual networks of the access points (3, 4, 5) to the services and/or network resources addressed thereto.
11. An adapter unit for connecting a computer (WS1 to WS7) over a wireless interface to an access point (3, 4, 5) of a wireless local area network, characterized in that an adapter unit (2A to 2G) comprises both a wired network adapter part (22) to be connected to a wired network interface of the computer (WS1 to WS7) and a wireless network adapter part (21), which is configured in advance by the supplier of the adapter unit to provide a secure wireless connection only to a predetermined access point (3, 4, 5) compatibly configured in advance by the supplier of the adapter unit.
12. Equipment for a wireless local area network, characterized in that the equipment comprise at least one adapter unit (2A to 2G) including a wired network adapter part (22) to be connected to a wired network interface of a computer (WS1 to WS7), and a wireless network adapter part (21), and a wireless network access point (3, 4, 5), and that the access point (3, 4, 5) and said at least one adapter unit are compatibly configured in advance by the supplier of the adapter unit to provide a wireless secure connection only with one another.
13. Equipment as claimed in claim 12, characterized in that the configuration data of the access point (3, 4, 5) and the at least one adapter unit (2A to 2G) include one or more of the following: a name of the wireless network, an encryption key index of the network, an encryption algorithm or method, an encryption key and a radio channel.
14. Equipment as claimed in claim 12 or 13, characterized in that the access point (3, 4, 5) comprises a hardware address filter for allowing connection for only the adapter units provided with particular hardware addresses.
15. Equipment as claimed in claim 12, 13 or 14, characterized in that the access point (3, 4, 5) is arranged to hide or remove the name of the wireless network during transmission, and that the equipment comprise means for hiding and securing the customer terminals and the connections thereof from one another.
US11/991,965 2005-09-15 2006-09-14 Wireless Local Area Network, Adapter Unit and Equipment Abandoned US20100265845A1 (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
FI20050292U FI6974U1 (en) 2005-09-15 2005-09-15 Wireless LAN
FIU20050292 2005-09-15
FI20055549 2005-10-10
FI20055549A FI122050B (en) 2005-09-15 2005-10-10 Wireless local area network, adapter unit and facility
PCT/FI2006/000304 WO2007031597A1 (en) 2005-09-15 2006-09-14 Wireless local area network, adapter unit and equipment

Publications (1)

Publication Number Publication Date
US20100265845A1 true US20100265845A1 (en) 2010-10-21

Family

ID=35185258

Family Applications (1)

Application Number Title Priority Date Filing Date
US11/991,965 Abandoned US20100265845A1 (en) 2005-09-15 2006-09-14 Wireless Local Area Network, Adapter Unit and Equipment

Country Status (4)

Country Link
US (1) US20100265845A1 (en)
EP (1) EP1935138A4 (en)
FI (1) FI122050B (en)
WO (1) WO2007031597A1 (en)

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080285575A1 (en) * 2007-03-01 2008-11-20 Meraki Networks, Inc. System and Method For Remote Monitoring And Control Of Network Devices
US20100235621A1 (en) * 2009-03-10 2010-09-16 Winkler david b Method of securely pairing devices with an access point for an ip-based wireless network
US20110299686A1 (en) * 2009-02-25 2011-12-08 Saboff Michael L Wireless device setup
US20120151023A1 (en) * 2010-12-09 2012-06-14 Samsung Electronics Co., Ltd. Image forming device, host device, and connecting methods thereof
US20120166804A1 (en) * 2006-12-22 2012-06-28 Brijesh Nambiar VLAN Tunneling
JP2012239120A (en) * 2011-05-13 2012-12-06 Ricoh Co Ltd Network system
US20130223230A1 (en) * 2012-02-27 2013-08-29 Qualcomm Incorporated Serving Multiple Subscribers Through a Software-Enabled Access Point
US8619545B2 (en) 2008-07-17 2013-12-31 T-Mobile Usa, Inc. System and method for selectively provisioning telecommunications services between an access point and a telecommunications network based on landline telephone detection
US8621071B1 (en) * 2010-06-23 2013-12-31 Marvell International Ltd. Method and apparatus for automatically selecting an access point
US8774148B2 (en) 2009-02-27 2014-07-08 T-Mobile Usa, Inc. System and method for provisioning telecommunications services between an access point and a telecommunications network and providing missing information notification
US8782740B1 (en) * 2009-01-28 2014-07-15 Crimson Corporation Systems and methods for detection of unauthorized or unsecured access points
US8885635B2 (en) 2008-07-17 2014-11-11 T-Mobile Usa, Inc. System and method for selectively provisioning telecommunications services between an access point and a telecommunications network using a subscriber identifier
US20150163670A1 (en) * 2005-06-22 2015-06-11 Odyssey Wireless, Inc. Systems/methods of conducting a financial transaction using a smartphone
US20150333965A1 (en) * 2014-05-19 2015-11-19 Comcast Cable Communications, Llc Device Provisioning
US20160044036A1 (en) * 2014-08-07 2016-02-11 Arris Enterprises, Inc. Managing private and public service set utilization
US9301155B2 (en) 2006-10-23 2016-03-29 T-Mobile Usa, Inc. System and method for managing access point functionality and configuration
US9374746B1 (en) 2008-07-07 2016-06-21 Odyssey Wireless, Inc. Systems/methods of spatial multiplexing
US9462411B2 (en) 2008-11-04 2016-10-04 Telcom Ventures, Llc Mobile device mode enablement responsive to a proximity criterion
US9565185B2 (en) 2014-11-24 2017-02-07 At&T Intellectual Property I, L.P. Facilitation of seamless security data transfer for wireless network devices
US9641202B2 (en) 2005-06-22 2017-05-02 Odyssey Wireless, Inc. Systems/methods of carrier aggregation
USRE47633E1 (en) * 2005-06-22 2019-10-01 Odyssey Wireless Inc. Systems/methods of conducting a financial transaction using a smartphone
US11641502B2 (en) 2016-12-22 2023-05-02 Sonifi Solutions, Inc. Methods and systems for implementing legacy remote and keystroke redirection
US11671651B2 (en) 2015-09-30 2023-06-06 Sonifi Solutions, Inc. Methods and systems for enabling communications between devices
US11689563B1 (en) * 2021-10-22 2023-06-27 Nudge Security, Inc. Discrete and aggregate email analysis to infer user behavior

Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020007407A1 (en) * 2000-07-12 2002-01-17 Klein John Raymond Auto configuration of portable computers for use in wireless local area networks
US20020165990A1 (en) * 2001-05-03 2002-11-07 Reefedge, Inc. Method and system for adapting short-range wireless access points for participation in a coordinated networked environment
US6512755B1 (en) * 1997-12-29 2003-01-28 Alcatel Usa Sourcing, L.P. Wireless telecommunications access system
US20040068653A1 (en) * 2002-10-08 2004-04-08 Fascenda Anthony C. Shared network access using different access keys
US20040085944A1 (en) * 2002-11-04 2004-05-06 Boehm Lawrence D. Portable wireless internet gateway
US20040214570A1 (en) * 2003-04-28 2004-10-28 Junbiao Zhang Technique for secure wireless LAN access
US20050048997A1 (en) * 2003-09-02 2005-03-03 Mike Grobler Wireless connectivity module
US20050135315A1 (en) * 2003-12-18 2005-06-23 Sinha Suman K. Applying wireless network connection profiles using windows management instrumentation
US20050152305A1 (en) * 2002-11-25 2005-07-14 Fujitsu Limited Apparatus, method, and medium for self-organizing multi-hop wireless access networks
US7002995B2 (en) * 2001-06-14 2006-02-21 At&T Corp. Broadband network with enterprise wireless communication system for residential and business environment
US7010002B2 (en) * 2001-06-14 2006-03-07 At&T Corp. Broadband network with enterprise wireless communication method for residential and business environment
US20060084417A1 (en) * 2002-07-10 2006-04-20 Diego Melpignano Interface selection from multiple networks
US20070250910A1 (en) * 2005-02-08 2007-10-25 Airpatrol Corporation Network Security Enhancement Methods, Apparatuses, System, Media, Signals and Computer Programs
US7363358B2 (en) * 2002-05-09 2008-04-22 Gateway Inc. Transporting a WAN configuration from a PC to a residential gateway
US20080130572A1 (en) * 2005-01-31 2008-06-05 Junbiao Zhang Local Mobility Solution With Wired and Wireless Interface Switching
US7424024B2 (en) * 2000-01-31 2008-09-09 3E Technologies International, Inc. Broadband communications access device
US7634230B2 (en) * 2002-11-25 2009-12-15 Fujitsu Limited Methods and apparatus for secure, portable, wireless and multi-hop data networking
US20100074239A1 (en) * 2005-04-11 2010-03-25 Joseph Born Wireless Detector and Adapter
US7715834B2 (en) * 2004-12-01 2010-05-11 Borther Kogyo Kabushiki Kaisha Wireless communication system, device, and method of setting up wireless communication adapter
US7733772B2 (en) * 2006-01-25 2010-06-08 Intel Corporation Dynamic selection of communication links in a mixed network
US7990985B2 (en) * 2000-01-31 2011-08-02 3E Technologies International, Inc. Broadband communications access device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004135134A (en) * 2002-10-11 2004-04-30 Tdk Corp Adapter for wireless communication

Patent Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6512755B1 (en) * 1997-12-29 2003-01-28 Alcatel Usa Sourcing, L.P. Wireless telecommunications access system
US7990985B2 (en) * 2000-01-31 2011-08-02 3E Technologies International, Inc. Broadband communications access device
US7424024B2 (en) * 2000-01-31 2008-09-09 3E Technologies International, Inc. Broadband communications access device
US20020007407A1 (en) * 2000-07-12 2002-01-17 Klein John Raymond Auto configuration of portable computers for use in wireless local area networks
US20020165990A1 (en) * 2001-05-03 2002-11-07 Reefedge, Inc. Method and system for adapting short-range wireless access points for participation in a coordinated networked environment
US7010002B2 (en) * 2001-06-14 2006-03-07 At&T Corp. Broadband network with enterprise wireless communication method for residential and business environment
US7002995B2 (en) * 2001-06-14 2006-02-21 At&T Corp. Broadband network with enterprise wireless communication system for residential and business environment
US7363358B2 (en) * 2002-05-09 2008-04-22 Gateway Inc. Transporting a WAN configuration from a PC to a residential gateway
US20060084417A1 (en) * 2002-07-10 2006-04-20 Diego Melpignano Interface selection from multiple networks
US20040068653A1 (en) * 2002-10-08 2004-04-08 Fascenda Anthony C. Shared network access using different access keys
US20040085944A1 (en) * 2002-11-04 2004-05-06 Boehm Lawrence D. Portable wireless internet gateway
US20050152305A1 (en) * 2002-11-25 2005-07-14 Fujitsu Limited Apparatus, method, and medium for self-organizing multi-hop wireless access networks
US7634230B2 (en) * 2002-11-25 2009-12-15 Fujitsu Limited Methods and apparatus for secure, portable, wireless and multi-hop data networking
US20040214570A1 (en) * 2003-04-28 2004-10-28 Junbiao Zhang Technique for secure wireless LAN access
US20050048997A1 (en) * 2003-09-02 2005-03-03 Mike Grobler Wireless connectivity module
US20050135315A1 (en) * 2003-12-18 2005-06-23 Sinha Suman K. Applying wireless network connection profiles using windows management instrumentation
US7715834B2 (en) * 2004-12-01 2010-05-11 Borther Kogyo Kabushiki Kaisha Wireless communication system, device, and method of setting up wireless communication adapter
US20080130572A1 (en) * 2005-01-31 2008-06-05 Junbiao Zhang Local Mobility Solution With Wired and Wireless Interface Switching
US20070250910A1 (en) * 2005-02-08 2007-10-25 Airpatrol Corporation Network Security Enhancement Methods, Apparatuses, System, Media, Signals and Computer Programs
US20100074239A1 (en) * 2005-04-11 2010-03-25 Joseph Born Wireless Detector and Adapter
US7733772B2 (en) * 2006-01-25 2010-06-08 Intel Corporation Dynamic selection of communication links in a mixed network

Cited By (64)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9641202B2 (en) 2005-06-22 2017-05-02 Odyssey Wireless, Inc. Systems/methods of carrier aggregation
US9392451B2 (en) * 2005-06-22 2016-07-12 Odyssey Wireless, Inc. Systems/methods of conducting a financial transaction using a smartphone
US20150163670A1 (en) * 2005-06-22 2015-06-11 Odyssey Wireless, Inc. Systems/methods of conducting a financial transaction using a smartphone
USRE47633E1 (en) * 2005-06-22 2019-10-01 Odyssey Wireless Inc. Systems/methods of conducting a financial transaction using a smartphone
US9705535B2 (en) 2005-06-22 2017-07-11 Odyssey Wireless, Inc. Systems/methods of carrier aggregation
US9301155B2 (en) 2006-10-23 2016-03-29 T-Mobile Usa, Inc. System and method for managing access point functionality and configuration
US10447533B2 (en) 2006-10-23 2019-10-15 T-Mobile Usa, Inc. System and method for managing access point functionality and configuration
US9843480B2 (en) 2006-10-23 2017-12-12 T-Mobile Usa, Inc. System and method for managing access point functionality and configuration
US20120166804A1 (en) * 2006-12-22 2012-06-28 Brijesh Nambiar VLAN Tunneling
US8339991B2 (en) * 2007-03-01 2012-12-25 Meraki, Inc. Node self-configuration and operation in a wireless network
US20080304427A1 (en) * 2007-03-01 2008-12-11 Meraki Networks, Inc. Node Self-Configuration And Operation In A Wireless Network
US8477771B2 (en) 2007-03-01 2013-07-02 Meraki Networks, Inc. System and method for remote monitoring and control of network devices
US9559891B2 (en) 2007-03-01 2017-01-31 Cisco Technology, Inc. System and method for hosted network management
US20080294759A1 (en) * 2007-03-01 2008-11-27 Meraki Networks, Inc. System and Method For Hosted Network Management
US8527662B2 (en) 2007-03-01 2013-09-03 Meraki, Inc. System and method for remote monitoring and control of network devices
US8595357B2 (en) 2007-03-01 2013-11-26 Cisco Technology, Inc. System and method for hosted network management
US20080285575A1 (en) * 2007-03-01 2008-11-20 Meraki Networks, Inc. System and Method For Remote Monitoring And Control Of Network Devices
US20080288614A1 (en) * 2007-03-01 2008-11-20 Meraki Networks, Inc. Client Addressing And Roaming In A Wireless Network
US9237063B2 (en) 2007-03-01 2016-01-12 Cisco Technology, Inc. System and method for remote monitoring and control of network devices
US9210034B2 (en) 2007-03-01 2015-12-08 Cisco Technology, Inc. Client addressing and roaming in a wireless network
US9374746B1 (en) 2008-07-07 2016-06-21 Odyssey Wireless, Inc. Systems/methods of spatial multiplexing
US8619545B2 (en) 2008-07-17 2013-12-31 T-Mobile Usa, Inc. System and method for selectively provisioning telecommunications services between an access point and a telecommunications network based on landline telephone detection
US9363740B2 (en) 2008-07-17 2016-06-07 T-Mobile Usa, Inc. System and method for selectively provisioning telecommunications services between an access point and a telecommunications network using a subscriber identifier
US8885635B2 (en) 2008-07-17 2014-11-11 T-Mobile Usa, Inc. System and method for selectively provisioning telecommunications services between an access point and a telecommunications network using a subscriber identifier
US11304118B2 (en) 2008-11-04 2022-04-12 Telcom Ventures Llc Method and apparatus for sensing products for purchase
US10660015B2 (en) 2008-11-04 2020-05-19 Telcom Ventures, Llc Mobile device mode enablement responsive to a proximity criterion
US11924743B2 (en) 2008-11-04 2024-03-05 Telcom Ventures Llc Systems/methods of establishing a capability, and using the capability, to execute financial transactions by a smartphone
US11937172B1 (en) 2008-11-04 2024-03-19 Telcom Ventures Llc Systems/methods of a two-step process in establishing a capability, and using the capability, to execute a financial transaction by a smartphone
US9832708B2 (en) 2008-11-04 2017-11-28 Telcom Ventures, Llc Mobile device mode enablement responsive to a proximity criterion
US11770756B2 (en) 2008-11-04 2023-09-26 Telcom Ventures Llc Mobile device mode enablement/disablement responsive to sensing a physiological parameter
US10219199B2 (en) 2008-11-04 2019-02-26 Telcom Ventures, Llc Mobile device mode enablement responsive to a proximity criterion
US10674432B2 (en) 2008-11-04 2020-06-02 Telcom Ventures, Llc Mobile device mode enablement responsive to a proximity criterion
US9462411B2 (en) 2008-11-04 2016-10-04 Telcom Ventures, Llc Mobile device mode enablement responsive to a proximity criterion
US12028793B2 (en) 2008-11-04 2024-07-02 Telcom Ventures Llc Systems/methods of establishing a capability, and then using the capability, to perform a financial transaction by a smartphone
US8782740B1 (en) * 2009-01-28 2014-07-15 Crimson Corporation Systems and methods for detection of unauthorized or unsecured access points
US20110299686A1 (en) * 2009-02-25 2011-12-08 Saboff Michael L Wireless device setup
US8724813B2 (en) * 2009-02-25 2014-05-13 Hewlett-Packard Development Company, L.P. Wireless device setup
US8774148B2 (en) 2009-02-27 2014-07-08 T-Mobile Usa, Inc. System and method for provisioning telecommunications services between an access point and a telecommunications network and providing missing information notification
US8484457B2 (en) * 2009-03-10 2013-07-09 T-Mobile Usa, Inc. Method of securely pairing devices with an access point for an IP-based wireless network
US20100235621A1 (en) * 2009-03-10 2010-09-16 Winkler david b Method of securely pairing devices with an access point for an ip-based wireless network
US8621071B1 (en) * 2010-06-23 2013-12-31 Marvell International Ltd. Method and apparatus for automatically selecting an access point
US20120151023A1 (en) * 2010-12-09 2012-06-14 Samsung Electronics Co., Ltd. Image forming device, host device, and connecting methods thereof
US8769064B2 (en) * 2010-12-09 2014-07-01 Samsung Electronics Co., Ltd. System using wired interface to configure wireless connection between host and image forming device
CN102546851A (en) * 2010-12-09 2012-07-04 三星电子株式会社 Image forming device, host device and connecting methods thereof
JP2012239120A (en) * 2011-05-13 2012-12-06 Ricoh Co Ltd Network system
US20130223230A1 (en) * 2012-02-27 2013-08-29 Qualcomm Incorporated Serving Multiple Subscribers Through a Software-Enabled Access Point
US9590857B2 (en) * 2014-05-19 2017-03-07 Comcast Cable Communications, Llc Device provisioning
US12081408B2 (en) 2014-05-19 2024-09-03 Comcast Cable Communications, Llc Device provisioning
US10917306B2 (en) 2014-05-19 2021-02-09 Comcast Cable Communications, Llc Device provisioning
US11706094B2 (en) 2014-05-19 2023-07-18 Comcast Cable Communications, Llc Device provisioning
US10148520B2 (en) 2014-05-19 2018-12-04 Comcast Cable Communications, Llc Device provisioning
US20150333965A1 (en) * 2014-05-19 2015-11-19 Comcast Cable Communications, Llc Device Provisioning
US9912667B2 (en) * 2014-08-07 2018-03-06 Arris Enterprises Llc Managing private and public service set utilization
US9674186B2 (en) * 2014-08-07 2017-06-06 Arris Enterprises, Inc. Managing private and public service set utilization
US20160044036A1 (en) * 2014-08-07 2016-02-11 Arris Enterprises, Inc. Managing private and public service set utilization
US10070312B2 (en) 2014-11-24 2018-09-04 At&T Intellectual Property I, L.P. Facilitation of seamless security data transfer for wireless network devices
US10616766B2 (en) 2014-11-24 2020-04-07 At&T Intellectual Property I, L.P. Facilitation of seamless security data transfer for wireless network devices
US9565185B2 (en) 2014-11-24 2017-02-07 At&T Intellectual Property I, L.P. Facilitation of seamless security data transfer for wireless network devices
US11671651B2 (en) 2015-09-30 2023-06-06 Sonifi Solutions, Inc. Methods and systems for enabling communications between devices
US12101527B2 (en) 2015-09-30 2024-09-24 Sonifi Solutions, Inc. Methods and systems for enabling communications between devices
US11641502B2 (en) 2016-12-22 2023-05-02 Sonifi Solutions, Inc. Methods and systems for implementing legacy remote and keystroke redirection
US12063406B2 (en) 2016-12-22 2024-08-13 Sonifi Solutions, Inc. Methods and systems for implementing legacy remote and keystroke redirection
US11689563B1 (en) * 2021-10-22 2023-06-27 Nudge Security, Inc. Discrete and aggregate email analysis to infer user behavior
US11799884B1 (en) 2021-10-22 2023-10-24 Nudge Security, Inc. Analysis of user email to detect use of Internet services

Also Published As

Publication number Publication date
FI122050B (en) 2011-07-29
EP1935138A1 (en) 2008-06-25
FI20055549A0 (en) 2005-10-10
FI20055549A (en) 2007-03-16
WO2007031597A1 (en) 2007-03-22
EP1935138A4 (en) 2009-05-20

Similar Documents

Publication Publication Date Title
US20100265845A1 (en) Wireless Local Area Network, Adapter Unit and Equipment
US7882247B2 (en) Method and apparatus for providing secure connectivity in mobile and other intermittent computing environments
EP1422875B1 (en) Wireless network handoff key
EP1935143B1 (en) Virtual lan override in a multiple bssid mode of operation
JP3984993B2 (en) Method and system for establishing a connection through an access network
US7688981B2 (en) Network partitioning using encryption
US8555344B1 (en) Methods and systems for fallback modes of operation within wireless computer networks
US7725707B2 (en) Server, VPN client, VPN system, and software
US20120072727A1 (en) Multi-isp controlled access to ip networks, based on third-party operated untrusted access stations
US7881667B2 (en) Methods and apparatus for secure, portable, wireless and multi-hop data networking
CN110087236A (en) For establishing the agreement of secure communication session by wireless network and anonymous host
US20020090089A1 (en) Methods and apparatus for secure wireless networking
US20060031936A1 (en) Encryption security in a network system
US20070127500A1 (en) System, device, method and software for providing a visitor access to a public network
KR20050084926A (en) Radio lan access authentication system
WO2005119964A1 (en) Method for establishing a security association between a wireless access point and a wireless node in a upnp environment
JPH07107083A (en) Cipher communication system
JP2005204086A (en) Mobile radio communications system, mobile radio terminal, virtual private network repeater, and connection authenticating server
JP2004533749A (en) Hybrid network
JP2004312257A (en) Base station, repeating device and communication system
EP1466434A1 (en) Method and apparatus for providing secure connectivity in mobile and other intermittent computing environments
Kalvan Designing and planning a network for a restaurant franchise
KR20030050550A (en) Simple IP virtual private network service in PDSN system
YAMAI et al. A user authentication system for secure wireless communication
Ibrahim Investigating the Effectiveness and Performance of WPA_PSK (Pre-Shared Key) and WPA_RADIUS Server in Wireless Network Security

Legal Events

Date Code Title Description
AS Assignment

Owner name: NETWORK SERVICES FINLAND OY, FINLAND

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LAMPEN, PATRIK;REEL/FRAME:022074/0869

Effective date: 20080409

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION